more translations.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@23756 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -358,7 +358,7 @@ krb5_DES_string_to_key(krb5_context context,
|
|||||||
len = password.length + salt.saltvalue.length;
|
len = password.length + salt.saltvalue.length;
|
||||||
s = malloc(len);
|
s = malloc(len);
|
||||||
if(len > 0 && s == NULL) {
|
if(len > 0 && s == NULL) {
|
||||||
krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
|
krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
|
||||||
return ENOMEM;
|
return ENOMEM;
|
||||||
}
|
}
|
||||||
memcpy(s, password.data, password.length);
|
memcpy(s, password.data, password.length);
|
||||||
@@ -440,7 +440,7 @@ DES3_string_to_key(krb5_context context,
|
|||||||
len = password.length + salt.saltvalue.length;
|
len = password.length + salt.saltvalue.length;
|
||||||
str = malloc(len);
|
str = malloc(len);
|
||||||
if(len != 0 && str == NULL) {
|
if(len != 0 && str == NULL) {
|
||||||
krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
|
krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
|
||||||
return ENOMEM;
|
return ENOMEM;
|
||||||
}
|
}
|
||||||
memcpy(str, password.data, password.length);
|
memcpy(str, password.data, password.length);
|
||||||
@@ -454,7 +454,7 @@ DES3_string_to_key(krb5_context context,
|
|||||||
if (ret) {
|
if (ret) {
|
||||||
memset(str, 0, len);
|
memset(str, 0, len);
|
||||||
free(str);
|
free(str);
|
||||||
krb5_set_error_message (context, ret, N_("malloc: out of memory", ""));
|
krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -502,7 +502,7 @@ DES3_string_to_key_derived(krb5_context context,
|
|||||||
|
|
||||||
s = malloc(len);
|
s = malloc(len);
|
||||||
if(len != 0 && s == NULL) {
|
if(len != 0 && s == NULL) {
|
||||||
krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
|
krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
|
||||||
return ENOMEM;
|
return ENOMEM;
|
||||||
}
|
}
|
||||||
memcpy(s, password.data, password.length);
|
memcpy(s, password.data, password.length);
|
||||||
@@ -588,20 +588,23 @@ ARCFOUR_string_to_key(krb5_context context,
|
|||||||
|
|
||||||
ret = wind_utf8ucs2_length(password.data, &len);
|
ret = wind_utf8ucs2_length(password.data, &len);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_set_error_message (context, ret, "Password not an UCS2 string");
|
krb5_set_error_message (context, ret,
|
||||||
|
N_("Password not an UCS2 string", ""));
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
s = malloc (len * sizeof(s[0]));
|
s = malloc (len * sizeof(s[0]));
|
||||||
if (len != 0 && s == NULL) {
|
if (len != 0 && s == NULL) {
|
||||||
krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
|
krb5_set_error_message (context, ENOMEM,
|
||||||
|
N_("malloc: out of memory", ""));
|
||||||
ret = ENOMEM;
|
ret = ENOMEM;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = wind_utf8ucs2(password.data, s, &len);
|
ret = wind_utf8ucs2(password.data, s, &len);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_set_error_message (context, ret, "Password not an UCS2 string");
|
krb5_set_error_message (context, ret,
|
||||||
|
N_("Password not an UCS2 string", ""));
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -954,7 +957,7 @@ krb5_string_to_salttype (krb5_context context,
|
|||||||
e = _find_enctype (etype);
|
e = _find_enctype (etype);
|
||||||
if (e == NULL) {
|
if (e == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
etype);
|
etype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -965,7 +968,7 @@ krb5_string_to_salttype (krb5_context context,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP,
|
krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP,
|
||||||
"salttype %s not supported", string);
|
N_("salttype %s not supported", ""), string);
|
||||||
return HEIM_ERR_SALTTYPE_NOSUPP;
|
return HEIM_ERR_SALTTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1068,7 +1071,7 @@ krb5_string_to_key_data_salt_opaque (krb5_context context,
|
|||||||
struct salt_type *st;
|
struct salt_type *st;
|
||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
enctype);
|
enctype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1077,7 +1080,7 @@ krb5_string_to_key_data_salt_opaque (krb5_context context,
|
|||||||
return (*st->string_to_key)(context, enctype, password,
|
return (*st->string_to_key)(context, enctype, password,
|
||||||
salt, opaque, key);
|
salt, opaque, key);
|
||||||
krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP,
|
krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP,
|
||||||
"salt type %d not supported",
|
N_("salt type %d not supported", ""),
|
||||||
salt.salttype);
|
salt.salttype);
|
||||||
return HEIM_ERR_SALTTYPE_NOSUPP;
|
return HEIM_ERR_SALTTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1124,7 +1127,7 @@ krb5_enctype_keysize(krb5_context context,
|
|||||||
struct encryption_type *et = _find_enctype(type);
|
struct encryption_type *et = _find_enctype(type);
|
||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1157,7 +1160,7 @@ krb5_generate_random_keyblock(krb5_context context,
|
|||||||
struct encryption_type *et = _find_enctype(type);
|
struct encryption_type *et = _find_enctype(type);
|
||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1484,7 +1487,7 @@ krb5_hmac(krb5_context context,
|
|||||||
|
|
||||||
if (c == NULL) {
|
if (c == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
cktype);
|
cktype);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1771,8 +1774,8 @@ create_checksum (krb5_context context,
|
|||||||
keyed_checksum = (ct->flags & F_KEYED) != 0;
|
keyed_checksum = (ct->flags & F_KEYED) != 0;
|
||||||
if(keyed_checksum && crypto == NULL) {
|
if(keyed_checksum && crypto == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"Checksum type %s is keyed "
|
N_("Checksum type %s is keyed but no "
|
||||||
"but no crypto context (key) was passed in",
|
"crypto context (key) was passed in", ""),
|
||||||
ct->name);
|
ct->name);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP; /* XXX */
|
return KRB5_PROG_SUMTYPE_NOSUPP; /* XXX */
|
||||||
}
|
}
|
||||||
@@ -1819,7 +1822,7 @@ krb5_create_checksum(krb5_context context,
|
|||||||
|
|
||||||
if(ct == NULL) {
|
if(ct == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1851,7 +1854,7 @@ verify_checksum(krb5_context context,
|
|||||||
ct = _find_checksum(cksum->cksumtype);
|
ct = _find_checksum(cksum->cksumtype);
|
||||||
if (ct == NULL || (ct->flags & F_DISABLED)) {
|
if (ct == NULL || (ct->flags & F_DISABLED)) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
cksum->cksumtype);
|
cksum->cksumtype);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1862,8 +1865,8 @@ verify_checksum(krb5_context context,
|
|||||||
keyed_checksum = (ct->flags & F_KEYED) != 0;
|
keyed_checksum = (ct->flags & F_KEYED) != 0;
|
||||||
if(keyed_checksum && crypto == NULL) {
|
if(keyed_checksum && crypto == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"Checksum type %s is keyed "
|
N_("Checksum type %s is keyed but no "
|
||||||
"but no crypto context (key) was passed in",
|
"crypto context (key) was passed in", "")
|
||||||
ct->name);
|
ct->name);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP; /* XXX */
|
return KRB5_PROG_SUMTYPE_NOSUPP; /* XXX */
|
||||||
}
|
}
|
||||||
@@ -1911,7 +1914,7 @@ krb5_verify_checksum(krb5_context context,
|
|||||||
ct = _find_checksum(cksum->cksumtype);
|
ct = _find_checksum(cksum->cksumtype);
|
||||||
if(ct == NULL) {
|
if(ct == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
cksum->cksumtype);
|
cksum->cksumtype);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1941,7 +1944,7 @@ krb5_crypto_get_checksum_type(krb5_context context,
|
|||||||
|
|
||||||
if (ct == NULL) {
|
if (ct == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type not found");
|
N_("checksum type not found", ""));
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1959,7 +1962,7 @@ krb5_checksumsize(krb5_context context,
|
|||||||
struct checksum_type *ct = _find_checksum(type);
|
struct checksum_type *ct = _find_checksum(type);
|
||||||
if(ct == NULL) {
|
if(ct == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1975,7 +1978,7 @@ krb5_checksum_is_keyed(krb5_context context,
|
|||||||
if(ct == NULL) {
|
if(ct == NULL) {
|
||||||
if (context)
|
if (context)
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -1990,7 +1993,7 @@ krb5_checksum_is_collision_proof(krb5_context context,
|
|||||||
if(ct == NULL) {
|
if(ct == NULL) {
|
||||||
if (context)
|
if (context)
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -2005,7 +2008,7 @@ krb5_checksum_disable(krb5_context context,
|
|||||||
if(ct == NULL) {
|
if(ct == NULL) {
|
||||||
if (context)
|
if (context)
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -2341,7 +2344,7 @@ AES_PRF(krb5_context context,
|
|||||||
result.cksumtype = ct->type;
|
result.cksumtype = ct->type;
|
||||||
ret = krb5_data_alloc(&result.checksum, ct->checksumsize);
|
ret = krb5_data_alloc(&result.checksum, ct->checksumsize);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_set_error_message(context, ret, "out memory");
|
krb5_set_error_message(context, ret, N_("malloc: out memory", ""));
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -2631,7 +2634,7 @@ krb5_enctype_to_string(krb5_context context,
|
|||||||
e = _find_enctype(etype);
|
e = _find_enctype(etype);
|
||||||
if(e == NULL) {
|
if(e == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
etype);
|
etype);
|
||||||
*string = NULL;
|
*string = NULL;
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
@@ -2656,7 +2659,7 @@ krb5_string_to_enctype(krb5_context context,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %s not supported",
|
N_("encryption type %s not supported", ""),
|
||||||
string);
|
string);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -2669,7 +2672,7 @@ krb5_enctype_to_keytype(krb5_context context,
|
|||||||
struct encryption_type *e = _find_enctype(etype);
|
struct encryption_type *e = _find_enctype(etype);
|
||||||
if(e == NULL) {
|
if(e == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
etype);
|
etype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -2684,13 +2687,13 @@ krb5_enctype_valid(krb5_context context,
|
|||||||
struct encryption_type *e = _find_enctype(etype);
|
struct encryption_type *e = _find_enctype(etype);
|
||||||
if(e == NULL) {
|
if(e == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
etype);
|
etype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
if (e->flags & F_DISABLED) {
|
if (e->flags & F_DISABLED) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %s is disabled",
|
N_("encryption type %s is disabled", ""),
|
||||||
e->name);
|
e->name);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -2729,7 +2732,7 @@ krb5_cksumtype_to_enctype(krb5_context context,
|
|||||||
}
|
}
|
||||||
|
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"ckecksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
(int)ctype);
|
(int)ctype);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -2742,13 +2745,13 @@ krb5_cksumtype_valid(krb5_context context,
|
|||||||
struct checksum_type *c = _find_checksum(ctype);
|
struct checksum_type *c = _find_checksum(ctype);
|
||||||
if (c == NULL) {
|
if (c == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %d not supported",
|
N_("checksum type %d not supported", ""),
|
||||||
ctype);
|
ctype);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
if (c->flags & F_DISABLED) {
|
if (c->flags & F_DISABLED) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
|
||||||
"checksum type %s is disabled",
|
N_("checksum type %s is disabled", ""),
|
||||||
c->name);
|
c->name);
|
||||||
return KRB5_PROG_SUMTYPE_NOSUPP;
|
return KRB5_PROG_SUMTYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -2973,8 +2976,8 @@ decrypt_internal_derived(krb5_context context,
|
|||||||
checksum_sz = CHECKSUMSIZE(et->keyed_checksum);
|
checksum_sz = CHECKSUMSIZE(et->keyed_checksum);
|
||||||
if (len < checksum_sz + et->confoundersize) {
|
if (len < checksum_sz + et->confoundersize) {
|
||||||
krb5_set_error_message(context, KRB5_BAD_MSIZE,
|
krb5_set_error_message(context, KRB5_BAD_MSIZE,
|
||||||
"Encrypted data shorter then "
|
N_("Encrypted data shorter then "
|
||||||
"checksum + confunder");
|
"checksum + confunder", ""));
|
||||||
return KRB5_BAD_MSIZE;
|
return KRB5_BAD_MSIZE;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -3870,7 +3873,7 @@ derive_key(krb5_context context,
|
|||||||
default:
|
default:
|
||||||
ret = KRB5_CRYPTO_INTERNAL;
|
ret = KRB5_CRYPTO_INTERNAL;
|
||||||
krb5_set_error_message(context, ret,
|
krb5_set_error_message(context, ret,
|
||||||
"derive_key() called with unknown keytype (%u)",
|
N_("derive_key() called with unknown keytype (%u)", ""),
|
||||||
kt->type);
|
kt->type);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
@@ -3914,7 +3917,7 @@ krb5_derive_key(krb5_context context,
|
|||||||
et = _find_enctype (etype);
|
et = _find_enctype (etype);
|
||||||
if (et == NULL) {
|
if (et == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
etype);
|
etype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -3978,7 +3981,7 @@ krb5_crypto_init(krb5_context context,
|
|||||||
free(*crypto);
|
free(*crypto);
|
||||||
*crypto = NULL;
|
*crypto = NULL;
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
etype);
|
etype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -4091,7 +4094,7 @@ krb5_enctype_disable(krb5_context context,
|
|||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
if (context)
|
if (context)
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
enctype);
|
enctype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -4118,7 +4121,7 @@ krb5_enctype_enable(krb5_context context,
|
|||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
if (context)
|
if (context)
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
enctype);
|
enctype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -4142,7 +4145,7 @@ krb5_string_to_key_derived(krb5_context context,
|
|||||||
|
|
||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
etype);
|
etype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -4293,14 +4296,15 @@ krb5_random_to_key(krb5_context context,
|
|||||||
struct encryption_type *et = _find_enctype(type);
|
struct encryption_type *et = _find_enctype(type);
|
||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
if ((et->keytype->bits + 7) / 8 > size) {
|
if ((et->keytype->bits + 7) / 8 > size) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption key %s needs %d bytes "
|
N_("encryption key %s needs %d bytes "
|
||||||
"of random to make an encryption key out of it",
|
"of random to make an encryption key "
|
||||||
|
"out of it", ""),
|
||||||
et->name, (int)et->keytype->size);
|
et->name, (int)et->keytype->size);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -4334,7 +4338,7 @@ _krb5_pk_octetstring2key(krb5_context context,
|
|||||||
|
|
||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -4390,7 +4394,7 @@ encode_uvinfo(krb5_context context, krb5_const_principal p, krb5_data *data)
|
|||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_data_zero(data);
|
krb5_data_zero(data);
|
||||||
krb5_set_error_message(context, ret,
|
krb5_set_error_message(context, ret,
|
||||||
"Failed to encode KRB5PrincipalName");
|
N_("Failed to encode KRB5PrincipalName", ""));
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
if (data->length != size)
|
if (data->length != size)
|
||||||
@@ -4426,7 +4430,7 @@ encode_otherinfo(krb5_context context,
|
|||||||
ASN1_MALLOC_ENCODE(PkinitSuppPubInfo, pub.data, pub.length,
|
ASN1_MALLOC_ENCODE(PkinitSuppPubInfo, pub.data, pub.length,
|
||||||
&pubinfo, &size, ret);
|
&pubinfo, &size, ret);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_set_error_message(context, ret, "out of memory");
|
krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
if (pub.length != size)
|
if (pub.length != size)
|
||||||
@@ -4453,7 +4457,7 @@ encode_otherinfo(krb5_context context,
|
|||||||
free(otherinfo.partyVInfo.data);
|
free(otherinfo.partyVInfo.data);
|
||||||
free(pub.data);
|
free(pub.data);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_set_error_message(context, ret, "out of memory");
|
krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
if (other->length != size)
|
if (other->length != size)
|
||||||
@@ -4485,7 +4489,7 @@ _krb5_pk_kdf(krb5_context context,
|
|||||||
|
|
||||||
if (der_heim_oid_cmp(oid_id_pkinit_kdf_ah_sha1(), &ai->algorithm) != 0) {
|
if (der_heim_oid_cmp(oid_id_pkinit_kdf_ah_sha1(), &ai->algorithm) != 0) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"kdf not supported");
|
N_("KDF not supported", ""));
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
if (ai->parameters != NULL &&
|
if (ai->parameters != NULL &&
|
||||||
@@ -4493,14 +4497,15 @@ _krb5_pk_kdf(krb5_context context,
|
|||||||
memcmp(ai->parameters->data, "\x05\x00", 2) != 0))
|
memcmp(ai->parameters->data, "\x05\x00", 2) != 0))
|
||||||
{
|
{
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"kdf params not NULL or the NULL-type");
|
N_("kdf params not NULL or the NULL-type",
|
||||||
|
""));
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
et = _find_enctype(enctype);
|
et = _find_enctype(enctype);
|
||||||
if(et == NULL) {
|
if(et == NULL) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
enctype);
|
enctype);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
@@ -4560,7 +4565,7 @@ krb5_crypto_prf_length(krb5_context context,
|
|||||||
|
|
||||||
if(et == NULL || et->prf_length == 0) {
|
if(et == NULL || et->prf_length == 0) {
|
||||||
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
|
||||||
"encryption type %d not supported",
|
N_("encryption type %d not supported", ""),
|
||||||
type);
|
type);
|
||||||
return KRB5_PROG_ETYPE_NOSUPP;
|
return KRB5_PROG_ETYPE_NOSUPP;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user